An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature

Author:

Muhammad Ali1,Amin Noor Ul1,Ullah Insaf2ORCID,Alsanad Ahmed3ORCID,Hussain Saddam1ORCID,Al-Hadhrami Suheer4,Uddin M. Irfan5,Khattak Hizbullah1,Khan Muhammad Asghar2ORCID

Affiliation:

1. Department of Information Technology, Hazara University, Mansehra 21120, Khyber Pakhtunkhwa, Pakistan

2. Hamdard Institute of Engineering & Technology, Hamdard University, Islamabad 44000, Pakistan

3. STC’s Artificial Intelligence Chair, Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia

4. Computer Engineering Department, Engineering College, Hadhramout University, Hadhramout, Yemen

5. Institute of Computing, Kohat University of Science and Technology, Kohat 2600, Pakistan

Abstract

Currently, hyperelliptic curve cryptography (HECC) got attractions towards low power devices such as Industrial Internet of Things (IIoT). As we all know, it has the capability of utilizing low key size, which can be suitable for IIoT environment. Inspired by the aforementioned property of HECC, we proposed an efficient scheme for IIoT using certificateless signature with the help of HECC. The presented approach is proven to be unforgeable against the challenges of type I and type II attackers. We tested the security of the designed approach through Automated Validation of Internet Security Protocols and Applications (AVISPA). We also performed the computational and communicational cost comparisons with already existed schemes, and it is observed from our analysis that our scheme is computationally efficient and needs low communication cost.

Funder

Deanship of Scientific Research, King Saud University

Publisher

Hindawi Limited

Subject

General Engineering,General Mathematics

Reference55 articles.

1. A clustering scheme for wireless sensor networks based on genetic algorithm and dominating set;J.-S. Pan;Journal of Internet Technology,2018

2. α-fraction first strategy for hierarchical model in wireless sensor networks;J.-S. Pan;Journal of Internet Technology,2018

3. Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing

4. Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3